Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC Compliance White Papers (View All Report Types)
76 - 100 of 438 Matches Previous Page  |  Next Page
Challenges & Strategies for UK Annuity Providers
sponsored by Wipro Technologies
WHITE PAPER: This white papers talks about the challenges facing the UK annuity market and the strategies that can be taken by the product providers to meet them. The paper also talks about how Wipro can partner with providers to tap the opportunities present in the marketplace.
Posted: 13 May 2009 | Published: 11 May 2009

Wipro Technologies

Change Governance Series: Making Sense of Regulations and Best Practices
sponsored by SERENA Software, Inc.
WHITE PAPER: Read this white paper to learn about the three most popular improvement methodologies, implementing best practices, important IT industry regulations, and the key differences between a regulation and a best practice.
Posted: 16 Mar 2006 | Published: 01 Jan 2005

SERENA Software, Inc.

Charting the way for the Information Governance imperative
sponsored by RSD
WHITE PAPER: Read this white paper to learn more about how to reach compliance guidelines and better secure your most important information.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

RSD

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

Choosing an SSO Solution - Ten Smart Questions
sponsored by Citrix
WHITE PAPER: Looking for the best enterprise single sign-on (SSO) solution? This white paper details ten key questions you should ask before choosing an SSO that will give your users the simple, secure access they need, save time and money, and improve IT security.
Posted: 30 Jan 2007 | Published: 30 Jan 2007

Citrix

Choosing the Right Enterprise Resource Planning (ERP) System: How to Avoid the 7 Fatal Flaws
sponsored by CDC Software - Ross Enterprise
WHITE PAPER: This paper explains the importance of choosing the Right Enterprise Resource Planning (ERP) System to avoid the 7 Fatal Flaws.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

CDC Software - Ross Enterprise

Cisco Interconnect Solutions for HP BladeSystem c-Class
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The latest switch technology allows you to cut down on the amount of physical assets, reduce problem resolution times and ensure information security and regulatory compliance in the data center.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Hewlett Packard Enterprise

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM

Closing Wireless Loopholes for PCI Compliance and Security
sponsored by AirMagnet
WHITE PAPER: Merchants who process payment cards need dedicated wireless monitoring systems that offer full traffic analysis and comprehensive security solutions to identify wireless security loopholes, provide solutions, and document compliance for audits. Read this white paper to learn more about ensuring PCI compliance in your wireless network.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

AirMagnet

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Cloud Computing in Perspective
sponsored by BMC Software, Inc.
WHITE PAPER: Many CIOs recognize the power of cloud computing and are looking to implement the technology in their own IT realms. But with all the noise in the market about cloud computing, how do you know where to begin? Learn how to better improve service delivery to your business with cloud computing.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

BMC Software, Inc.

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks
sponsored by OpenText
WHITE PAPER: This white paper explores the potential compliance related benefits to adopting fax server technology.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

OpenText

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

Consensual Fax: Strategies for Happy Customers and FCC Compliance
sponsored by FaxBack, Inc.
WHITE PAPER: Provides a brief introduction to the July 2003 updated FCC regulations regarding fax and discusses tools to help companies fax responsibly.
Posted: 18 Sep 2003 | Published: 01 May 2004

FaxBack, Inc.

Considerations for Designing, Implementing, and Managing an Email Archive Solution
sponsored by Datalink and Symantec
WHITE PAPER: Email archiving is critical to providing archive, search and retrieval options for compliance and discovery mandates. Download this white paper for tips on selecting and implementing an appropriate and effective archive system.
Posted: 27 Sep 2007 | Published: 01 Sep 2007

Datalink and Symantec

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Controlling the Cost of File Transfers
sponsored by Attachmate Corporation
WHITE PAPER: View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.
Posted: 09 Apr 2013 | Published: 31 Dec 2010

Attachmate Corporation

Core HR Kit: Cut costs, engage your people, and ensure compliance
sponsored by SuccessFactors
WHITE PAPER: This resource offers insight to help you choose an effective core HR system. Read on to discover key benefits of the right tool and learn how you can get started today.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

SuccessFactors

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange
sponsored by IntraLinks, Inc
WHITE PAPER: This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

IntraLinks, Inc

Countdown to Copenhagen: Government, business and the battle against climate change
sponsored by SAP AG
WHITE PAPER: Government, business and the battle against climate change is an EIU report that investigates the current regulatory outlook within key regions of the world.
Posted: 21 Jul 2009 | Published: 21 Jul 2009

SAP AG

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company
76 - 100 of 438 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement